Share via

How to enable notification alert for service principal Risky sign-in detection from workload identity

MOD Administrator 0 Reputation points
2025-11-18T08:15:10.3166667+00:00

How to enable notification alert for service principal Risky sign-in detection from workload identity.
I don't see any options available and if not available in Azure is there any other way we can do that.

Microsoft Security | Microsoft Entra | Microsoft Entra ID
0 comments No comments

2 answers

Sort by: Most helpful
  1. Jose Benjamin Solis Nolasco 8,076 Reputation points Volunteer Moderator
    2025-11-18T13:37:41.0733333+00:00

    Welcome to Microsoft Q&A,

    @MOD Administrator there is no "email alert" button for workload identities in the portal, your best approach is to leverage Diagnostic Settings to send ServicePrincipalRiskEvents to a Log Analytics Workspace, and then create an Azure Monitor Alert Rule based on a KQL query.

    Personally, my favorite way to do it is using Diagnostic Settings then send to Log Analytics;

    Step by step would look like this for example;

    You need to send the Workload Identity Risk data to a destination where you can build an alert.

    • Go to the Microsoft Entra admin center.
    • Navigate to Identity > Monitoring & health > Diagnostic settings.
    • Select Add diagnostic setting.
    • Give your setting a name (e.g., WorkloadIdentityRisk_Alerts).
    • Under Logs, select the category: ServicePrincipalRiskEvents.
    • Under Destination details, check Send to Log Analytics workspace and choose your desired workspace.

    Let me know if you need further assistance.

    😊 If my answer helped you resolve your issue, please consider marking it as the correct answer. This helps others in the community find solutions more easily. Thanks!

    Was this answer helpful?

    1 person found this answer helpful.

  2. Adam Zachary 2,265 Reputation points
    2025-11-20T23:10:12.1533333+00:00

    A while ago I built something similar for a customer who needed more than just an email notification, they wanted risky service principal sign-ins to trigger an automated response.

    Since Entra ID doesn’t provide a native ‘notify me’ switch for workload identity risk, you have to build the signal yourself.

    The cleanest approach is:

    Enable Diagnostic Settings and send ServicePrincipalRiskEvents into a Log Analytics workspace.

    From there, create an Azure Monitor alert that fires whenever a new risky event appears.

    Instead of using email only, connect the alert to an Action Group that calls a Logic App.

    That Logic App is where you can get creative. For example, your workflow can:

    • Automatically disable the service principal until someone reviews it. • Send a Teams or Slack message with the correlation ID and the IP address. • Open a ticket in your SOC system. • Rotate credentials or secrets stored in Key Vault. • Trigger a Sentinel automation rule if you’re using Sentinel. • Send a webhook into whatever automation platform you already use.

    This gives you real-time detection and a response flow tailored to how your team works.

    So the short answer is: Log --> Alert --> Action Group --> Logic App = full notification plus automated remediation for risky service principal sign-ins.

    That’s currently the most flexible and reliable way to monitor workload identity risk in Entra ID.

    Was this answer helpful?

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.